Sciweavers

666 search results - page 108 / 134
» A Practical Approach to Access Heterogeneous and Distributed...
Sort
View
TPDS
2010
117views more  TPDS 2010»
13 years 3 months ago
Reputation-Based Resource Allocation in P2P Systems of Rational Users
In this paper, we study p2p systems, where peers have to share their available resources between their own and other peers' needs. One such example is a system of peers who us...
Anna Satsiou, Leandros Tassiulas
IEEEARES
2010
IEEE
14 years 3 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
BMCBI
2010
108views more  BMCBI 2010»
13 years 6 months ago
BIGSdb: Scalable analysis of bacterial genome variation at the population level
Background: The opportunities for bacterial population genomics that are being realised by the application of parallel nucleotide sequencing require novel bioinformatics platforms...
Keith A. Jolley, Martin C. J. Maiden
SIGMOD
2001
ACM
104views Database» more  SIGMOD 2001»
14 years 9 months ago
Independence is Good: Dependency-Based Histogram Synopses for High-Dimensional Data
Approximating the joint data distribution of a multi-dimensional data set through a compact and accurate histogram synopsis is a fundamental problem arising in numerous practical ...
Amol Deshpande, Minos N. Garofalakis, Rajeev Rasto...
ISSA
2004
13 years 10 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo